Sciweavers

725 search results - page 84 / 145
» A Generalization of Repetition Threshold
Sort
View
ATAL
2003
Springer
14 years 5 days ago
A false-name-proof double auction protocol for arbitrary evaluation values
We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategyproofness...
Yuko Sakurai, Makoto Yokoo
BMCBI
2008
172views more  BMCBI 2008»
13 years 8 months ago
Compo: composite motif discovery using discrete models
Background: Computational discovery of motifs in biomolecular sequences is an established field, with applications both in the discovery of functional sites in proteins and regula...
Geir Kjetil Sandve, Osman Abul, Finn Drablø...
STOC
2012
ACM
256views Algorithms» more  STOC 2012»
11 years 11 months ago
Competitive contagion in networks
We develop a game-theoretic framework for the study of competition between firms who have budgets to “seed” the initial adoption of their products by consumers located in a s...
Sanjeev Goyal, Michael Kearns
COLING
1990
13 years 9 months ago
Syntactic Normalization Of Spontaneous Speech
This paper presents some techniques that provide a standard parsing system for the analysis of ill-formed utterances. These techniques are feature generalization and heuristically...
Hagen Langer
PODS
2008
ACM
128views Database» more  PODS 2008»
14 years 8 months ago
Shape sensitive geometric monitoring
A fundamental problem in distributed computation is the distributed evaluation of functions. The goal is to determine the value of a function over a set of distributed inputs, in ...
Izchak Sharfman, Assaf Schuster, Daniel Keren